Key-Privacy in Public-Key Encryption
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Plug-and-play PKI: a PKI your mother can use
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
HOTSEC'06 Proceedings of the 1st USENIX Workshop on Hot Topics in Security
Perspectives: improving SSH-style host authentication with multi-path probing
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
Proceedings of the 5th international conference on Emerging networking experiments and technologies
ACT: audio conference tool over named data networking
Proceedings of the ACM SIGCOMM workshop on Information-centric networking
Optimizing bi-directional low-latency communication in named data networking
ACM SIGCOMM Computer Communication Review
Hi-index | 0.00 |
Instead of securing the communication channel between sources and destinations as in today's Internet, Named Data Networking (NDN), a recently proposed Internet architecture, is designed to secure data directly. To further understand the design space of securing applications through securing data, we performed a case study of designing the security mechanisms for the Audio Conference Tool (ACT). Utilizing NDN's built-in primitive of signed data packets, we applied basic cryptographic schemes in a straightforward manner to effectively secure conferencing control information as well as voice data.